US10291463B2 - Large-scale distributed correlation - Google Patents
Large-scale distributed correlation Download PDFInfo
- Publication number
- US10291463B2 US10291463B2 US14/952,313 US201514952313A US10291463B2 US 10291463 B2 US10291463 B2 US 10291463B2 US 201514952313 A US201514952313 A US 201514952313A US 10291463 B2 US10291463 B2 US 10291463B2
- Authority
- US
- United States
- Prior art keywords
- level node
- correlation
- performance metric
- node
- level
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0631—Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
- H04L41/064—Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis involving time analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/04—Network management architectures or arrangements
- H04L41/044—Network management architectures or arrangements comprising hierarchical management structures
Definitions
- various types of metrics data including numerical and unstructured metrics data, for applications and networks are collected in order to monitor application and network performance.
- these collected metrics may be analyzed via correlation to diagnose probable root cause(s).
- Correlating the collected metrics may allow for the identification of the metrics most correlated to a problematic metric associated with the performance degradation.
- These most correlated metrics may likely be associated with the probable root cause(s).
- traditional correlation techniques become less reliable and determining the most correlated metrics becomes exceedingly computationally prohibitive.
- applications are also operating on increasingly finer-grained data, such as finer time resolutions for performance data. This finer-grained data further increases the amount of sampled data, which may exacerbate computational complexity needed to perform correlation.
- FIG. 1 is a block diagram of a system of hierarchically distributed analytics nodes for performing distributed correlation, according to an example embodiment.
- FIG. 2 illustrates an example graphical representation for how metric deviations may be calculated, according to an example embodiment.
- FIG. 3 illustrates an example correlation graph constructed during correlation calculations, according to an example embodiment.
- FIG. 4 is a flowchart illustrating a process of performing a local correlation at a local-level node, according to an example embodiment.
- FIG. 5 is a flowchart illustrating a process of diagnosing application-performance degradation using distributed correlation, according to an example embodiment.
- FIG. 6 is a diagram illustrating an example application dependency map including a view of a corresponding network dependency map, according to an example embodiment.
- FIG. 7 is an example computer system useful for implementing various embodiments.
- Embodiments allow for effective implementation of Application Performance Management (APM), which refers to detecting, diagnosing, and/or triaging the root cause for performance problems in applications. By efficiently identifying and/or correcting performance problems, performance impact on application users may be minimized and an expected level of service may be maintained.
- API Application Performance Management
- NPM Network Performance Management
- FIG. 1 illustrates a system 100 of hierarchically distributed analytics nodes (top-level nodes 102 , mid-level nodes 104 , and local-level nodes 106 ) for performing distributed correlation, according to an example embodiment.
- the analytics nodes may be designated as top-level nodes 102 , mid-level nodes 104 , or local-level nodes 106 depending on their roles and/or locations in system 100 of hierarchically distributed analytics nodes.
- These analytics nodes may be implemented using any type of computing device, for example, web servers, application servers, database servers, computers, or clusters of servers or computers. In an embodiment, one or more of these analytics nodes may be implemented using tiers or hierarchies of servers or computers. In an embodiment, the same computing devices and hardware may be used to implement each of the differently designated analytics nodes.
- top-level nodes 102 may be connected via a local area network (LAN), metropolitan area network (MAN), or wide area network (WAN) and communicate using any point-to-point or multipoint-to-multipoint networking protocols.
- LAN local area network
- MAN metropolitan area network
- WAN wide area network
- point-to-point or multipoint-to-multipoint networking protocols may be used.
- Local-level node(s) 106 may operate software applications 130 and/or be directly operated by clients using software applications 130 .
- Software applications 130 may include various types of enterprise infrastructure software or enterprise application software typically implemented across many servers/computers.
- Enterprise software may be any purpose-designed computer software to service the needs of an organization. The organizations may range from businesses, schools, clubs, and retailers, to government entities, or any other entity. Accordingly, enterprise software may include, for example, database management system software, human resource management software, enterprise resource planning (ERP) software, supply chain management software, and business intelligence software. Enterprise software may also include E-commerce software and software-as-a-service E-commerce solutions.
- the application software is not limited to enterprise software and may additionally include content access software (media players, web browsers, etc.), entertainment software (video games, computer games, etc.), educational software, computer simulation software, media development software (video/sound/image editing software, etc.), and product engineering software (computer-aided design software, integrated development environment software, etc.)
- content access software media players, web browsers, etc.
- entertainment software video games, computer games, etc.
- educational software computer simulation software
- media development software video/sound/image editing software, etc.
- product engineering software computer-aided design software, integrated development environment software, etc.
- Local-level node 106 G may also contain correlation module 126 , metrics monitoring module 128 , and metrics data collection module 132 and communicate with local performance management database (PMDB) 124 .
- PMDB 124 may serve as a database and/or database management system to store data needed by the modules. This data may include metrics data, correlation results, correlation and metrics-monitoring parameters, and information communicated between local-level node 106 G and higher-level nodes, such as mid-level node 104 B. These modules and local PMDB 124 together may allow local-level node 106 G the capability to perform both instrumentation and local correlation analytics itself.
- local-level nodes 106 such as local level node 106 F, may be virtually configured in a cloud environment 101 .
- local-level nodes 106 may be configured to monitor one or more application servers that are external to local-level node 106 G. Each application server may run one or more software applications 130 .
- Software application 130 may include one or more of the following: correlation module 126 , metrics monitoring module 128 , and metrics data collection module 132 , may also be implemented within a software application 130 .
- Metrics data collection module 132 may implement instrumentation by collecting various metrics data used in quantifying performance for software applications 130 .
- the various metrics data may originate from many disparate application metric domains, some of which are not necessarily from software applications 130 . These domains may include:
- End-user experience (EUE):—which may include EUE metrics measured through in-browser instrumentation, passive observation of the number of packets or packet flow on a wire, synthetic testing, or end system agents (typically observing packets at the driver level).
- Application dependency mapping which may include run-time application dependency mapping for each application transaction.
- Application component monitoring which may include the nodes's hardware, operating systems, software platforms, application code, shared libraries, databases, and storage systems, etc.
- Network infrastructure monitoring which may include various network infrastructure, such as routers, switches, logical entities such as VPNs, tunnels, and so forth.
- Transaction tracing which may include a detailed understanding of each application transaction that occurred, the physical and software entities that were utilized touched, and their performance, at individual application tiers (web server, application server, etc.) and across multiple tiers simultaneously.
- Log processing which may include any kind of log data, for example from a device-level logs, from software-level logs, or performance anomaly logs, etc.
- Event data which may include any type of event data for any event source such as from monitoring systems, device-generated traps, or syslog messages, or third party systems, etc.
- the types of application metrics collected may also be disparate (in time granularity, time synchronization, continuous versus discrete, numerical versus unstructured, etc.) depending on the particular metric and/or metric domain.
- a typical EUE type metric may be average application response time, which is both numerical and continuous.
- log data metrics are likely unstructured because event data stored in logs are largely in free form text form.
- event data may be understood as any type of record that is created in logs and affixed with a timestamp, which may be one of a few numerical data associated with the event data.
- Metrics such as memory consumption, CPU utilization, average application response time, average wait time, calls per minute, average request size etc. may apply to many metric domains and are also numerical and be measured at different time granularities.
- Local-level node 106 may additionally implement application program interfaces (APIs) to external systems, which may provide indirect instrumentation means.
- APIs application program interfaces
- metrics data collection module 132 may also automatically discover metrics that are available for software applications 130 or other processes running in local-level node 106 G. This auto-discovery process may be run whenever a new software application is initiated and/or on a periodic basis. In an embodiment, metrics data collection module 132 may receive metrics-of-interest to monitor from a higher-level analytics node 104 via metrics monitoring module 128 .
- Metrics monitoring module 128 may monitor the various metrics for applications collected by metrics data collection module 132 and trigger an alert if/when performance degradation for a metric is detected/diagnosed.
- monitoring various metrics may include forwarding the collected application-metrics data to local PMDB 124 for long-term storage.
- local PMDB 124 for each local-level node 106 , data may be stored close to its source and improve server processing by minimizing network bandwidth needed to access and manipulate the data.
- metrics data at local-level node 106 G may be forwarded to a higher-level analytics node, such as mid-level node 104 B.
- mid-level node 104 B may forward the metrics data to mid PMDB 116 for long-term storage.
- metrics data may be statistically consolidated.
- metrics monitoring module 128 may be configured to consolidate 900 raw 1-second samples of a metric into a single “bucketized” histogram time slice representative of the raw samples.
- the “bucketized” histogram time slice may contain: a consolidation timestamp indicating a time at which consolidation occurs or potentially the most recent sample in the 900 raw samples, sum of all samples, count of all samples (which should be 900, but may vary depending on system status and/or user requirements), and a set of percentile values.
- the set of percentile values may be, for example, 0% (minimum), 5%, 25%, 50%, 75%, 95%, and 100% (maximum).
- 0% minimum
- 5% 5%
- 25% 50%
- 50% 75%
- 95% 100%
- 100% maximum
- Local-level node 106 G may then transmit the consolidated metric representation to mid-level node 104 B to be stored in a more centralized PMDB, mid PMDB 116 .
- the benefits provided by metric consolidation include minimizing overhead on the network, preserving metric distribution (via, for example, the consolidated histogram representation) with very little loss, and storing much more consolidated data in higher-level analytics nodes, such as mid-level node 104 B and top-level node 102 .
- FIG. 2 illustrates a metric deviation graph 200 , which is a graphical representation for how metrics monitoring module 128 may detect/diagnose metric data anomalies indicative of performance degradation, according to an example embodiment.
- the graph shows data (value) collected for a metric against time.
- metrics monitoring module 128 may perform dynamic baselining.
- Dynamic baselining may encompass dynamically learning metric behavior over time (for a particular metric measuring a performance aspect of software application 130 ) in order to determine what ranges of values for metrics is “typical”.
- a “typical” value may be represented by values between the upper dynamic limit and lower dynamic limit demarcations. Effective dynamic baselining may reduce false alarms as to metric anomalies and provide increase sensitivity to truly unexpected metric behavior.
- Metrics monitoring module 128 may detect/diagnose metric data anomalies through deviation scoring and thresholding, which is a method of mathematically/statistically interpreting the metric samples against the dynamic baseline indicated by the upper and lower dynamic limit demarcations.
- the diagnostic of metric data anomalies may include continuously calculating and analyzing metric deviations of dynamically updated metric data.
- the metric data may be stored in a first in, first out (FIFO) data structure such as a rolling buffer.
- FIFO first in, first out
- the rolling buffer may overwrite old metric data with new metric data using, for example, FIFO techniques.
- An example method for calculating deviations for a metric is to calculate the ratio of area outside of the “typical” range to area within the “typical” range.
- the following formula would calculate a deviation score: 100*(A+B+C+D+E)/F.
- Threshold values indicating whether a metric is behaving “abnormally” may be statically defined or automatically and dynamically computed according to learned metric behavior.
- Deriving deviation scores based on ratios may allow the metric deviation scores to be scale independent. The scale independent nature of deviation scores may enable disparate metrics from different tiers or levels of analytics nodes to be compared, analyzed, and ranked at metrics monitoring module 128 and correlation module 126 on local-level node 106 G.
- metrics monitoring module 128 may trigger an alert and initiate a distributed correlation process to diagnose the root cause for the violation by propagating the alert to a higher-level analytics node, such as mid-level node 104 B. Due to the scale independent nature of deviation scores, disparate metrics from different tiers or levels of analytics nodes may also be compared, analyzed, and ranked at the higher-level analytics node, such as mid-level node 104 B.
- an alert may be internally or externally provided.
- Example triggers for the alert may include event from a 3 rd party (external) event management system, rule-triggered event from processing log data (internal or external), or manually provided input from, for example, a help desk call.
- Correlation module 126 from local-level node 106 G, may be capable of performing both local and distributed correlation analytics.
- Local correlation refers to performing correlation among metrics collected locally at local-level node 106 G and likely stored in local PMDB 124 .
- Distributed correlation may refer to executing a correlation request initiated from another analytics node in system 100 .
- distributed correlation includes correlating a time series of data that is “passed in” against locally stored metrics data. The correlation request and time series may have been passed to local-level node 106 G via mid-level node 104 B.
- the time series may have originated from a higher-level analytics node, such as top-level node 102 , and subsequently “passed in” to mid-level node 104 B.
- correlation is a technique that may be used to determine how related application metrics are to each other.
- the generated correlation results may be used to identify probable root causes of metrics anomalies indicative of application performance problems.
- metrics data collection module 132 may collect response times for when bank account balances are checked to quantify the service level delivered to an end user performing a specific transaction.
- correlation techniques may be utilized to determine the cause of the degradation—e.g. an overloaded server or under-resourced virtual machine, a faulty communication pathway causing packet errors, a poorly implemented database query, misconfigured load balancing, etc.
- correlation may not imply causality
- correlation in the context of domain specific knowledge permits diagnosis of a “probable root cause.”
- application metric A is known to depend on application metric B, and the physical mechanism of the dependency is understood, then it may be inferred with a high probability that a spike in A is likely caused by a spike in metric B.
- a spike in metric B may further inferred to be caused by a dip in metric C if an inverse relationship between metric B and C exists and is understood.
- correlation module 126 may perform correlation of application metrics by constructing graphs of pairwise application metric dependencies.
- FIG. 3 illustrates a possible metrics correlation graph 300 constructed by correlation module 126 , according to an embodiment.
- the nodes in metrics correlation graph 300 represent application metrics stored in local PMDB 124 used in the correlation.
- the edges connecting nodes represent dependencies between the nodes and the associated labels indicate a correlation strength correlation coefficient.
- a node may be designated an application metric of interest, e.g. the root of a tree in the graph.
- metrics-of-interest such as a time-series data for root metric 2 , may have been passed in from mid-level node 104 B. The example in FIG.
- the graph may have almost arbitrary structure due to noise and imprecision that may be inherent in metrics data due to issues such as data granularity, time synchronization, and missing or inaccurate data.
- the number of levels of dependencies and the metrics identified at each level may also be statically or dynamically configured depending on a variety of factors including correlation strengths, resource availability, processing power, and user requirements/rules at a particular local-level node 106 .
- Limitations and bounds to correlation computations may be necessary because for a number N of metrics collected and/or received at a local-level node 106 , there may be N(N ⁇ 1) pairs of correlation computations at that level and (N ⁇ 1)(N ⁇ 2) pairs of correlation computations at a succeeding level, and so forth.
- N of metrics reach the thousands and tens of thousands e.g. across many nodes, completing computations become exceedingly resource intensive.
- nodes 304 , 306 , 308 , and 310 may have been selected for the first level of dependency to root metric 2 ( 302 ).
- the four nodes in the first level of dependency may have been selected when the correlation strength exceeds 0.75.
- a hybrid of correlation strength thresholds and maximum number of selected nodes may be utilized.
- various leaf nodes may be pruned or filtered based on the strength of correlation where a lower correlation coefficient may indicate less probably causal pathways.
- the filtering may be alternatively (or in combination) accomplished using search or mathematical programming techniques such as max-flow min-cut to identify path(s) of maximal end-to-end correlation strengths.
- metrics data collection module 126 may also collect information relating to application and network dependency maps, which may be used in the construction and/or pruning of correlation graphs.
- the application dependency map may be statically generated or generated at run-time or in real-time.
- a run-time application dependency map may depict Layer 3 topology at run-time just prior to execution.
- Network dependency maps may depict how specific application device are actually connected in the network. For example, if the application dependency map and/or the network dependency map show metric 1 ( 308 ) is independent from root metric 2 ( 302 ) then metric 1 ( 308 ) (and its leaf nodes 316 , 318 , and 320 ) are clearly not a probably cause of the alert triggered for root metric 2 ( 302 ) and can be pruned.
- FIG. 6 illustrates a diagram 600 of an example application dependency map 602 and a corresponding network dependency map 604 that is generated based on information associated with connection 606 between two application components within application dependency map 602 .
- the application dependency map 602 and network dependency map 604 may be generated by one or more mapping tools within nodes 102 , 104 , and 106 of system 100 .
- the mapping tools may be configured to automatically generate application dependency map 602 and network dependency map 604 , according to an embodiment.
- the mapping tools may be configured to manually, based in part on user input, generate application dependency map 602 and network dependency map 604 , or use a combination of automatic generation and manual generation.
- the application dependency map 602 and network dependency map 604 may be generated by a single mapping tool.
- Application dependency map 602 may provide a visualization of the flow of data throughout multiple domains and components of an application architecture across one or more servers/computers of an organization.
- the multiple components may include front-end web page URLs, application components, server infrastructure components, virtual-to-physical infrastructure components, databases, transaction tables, and user clients.
- the mapping tool may generate a network dependency map 604 visualizing a network path between the two application components.
- the network path may consist of Layer 2/Layer 3 path information including both physical and logical (e.g., IP routing domains, tunnels, etc.) path information.
- Data metrics related to the network may include interface packet loss, latency, and host CPU utilization, or any other metric collected by any node along the network path of network dependency map 604 .
- the mapping tool may generate a network dependency mapping of the entire workflow (or for a portion of the application components within application dependency map 602 ) as opposed to the connection 606 just between two application components as illustrated in FIG. 6 .
- application/network dependency map information may be propagated from lower-level nodes 106 up the system 100 of hierarchically distributed analytics nodes to mid-level node 104 , and ultimately to top-level node 102 .
- the top-level node 102 may maintain a system view of the application/network dependency mappings for software applications 130 and associated metrics in system 100 .
- top-level node 102 may propagate dependencies back down through mid-level nodes 104 (if any) to lower-level nodes 106 .
- the lower-level nodes may then either use the dependencies to further prune the correlation graphs and/or construct the correlation graphs more efficiently by ignoring metrics unrelated to the root metric.
- mid-level nodes 104 may likewise contain mid-correlation module 118 , mid-metrics analytics viewer 122 , and mid-performance monitoring module 120 .
- Mid-level node 104 B may also store raw/aggregated metrics data received from a lower-level mid-level node 104 or local-level 106 in mid PMDB 116 .
- mid-level node 104 such as mid-level node 104 C, may be virtually configured in cloud environment 101 .
- Mid-metrics monitoring module 120 may propagate alerts triggered in a lower-level node 106 or passed via a lower-level mid-level node 104 up system 100 .
- mid-metrics monitoring module 120 may also centralize the raw/aggregated metrics data received from a lower-level mid-level node 104 C and local-level nodes 106 F and 106 G in mid PMDB 116 .
- the stored metrics data may allow for correlation computations to be performed at mid-level node 104 B without propagating the distributed correlation request received from a higher-level analytics node such as top-level node 102 .
- mid-level node 104 B may make a determination to process the correlation locally or propagate the distributed correlation request to a lower-level analytics node based on a threshold for an aggregation level of the metrics. This threshold may be manually or automatically configured depending on whether historically diagnosed probable causes have been accurate.
- Mid-correlation module 118 performs functions analogous to those for correlation module 126 in local-level 106 G.
- mid-correlation module 118 may be able to selectively perform correlation computations at mid-correlation module 118 or propagate the distributed correlation request to lower-level nodes (mid-level node 204 ) or lower-level nodes 106 .
- a distributed correlation request received from a higher-level analytics node may be selectively propagated down system 100 based on the application/network dependency mapping maintained at top-level node 102 to improve analytics efficiency.
- This dependency mapping may be constructed, for example, for a given transaction. If mid-level node 104 C and its local-level nodes 106 C, 106 D, and 106 E are known to be not involved with the given transaction, there is no reason for mid-level node 104 B to propagate the received distributed correlation request to mid-level node 104 C.
- Another advantage includes reducing false positives in con-elation computations since uninvolved analytics nodes and associated metrics are pruned from the correlation graph, eliminating any “coincidental” correlation results.
- Mid-metrics analytics viewer 122 in mid-level node 104 B may allow for a user or administrator to analyze and/or view the deviations for application metrics data calculated at child analytics nodes 104 C, 106 F and 106 G. Since metric-deviations scores may be scale independent, mid-metrics analytics viewer 122 may easily compare and rank metrics in its domain based on the deviation scores. In an embodiment, mid-metrics analytics viewer 122 may propagate the deviations data for application metrics up the system 100 , ultimately to top-level node 102 .
- mid-metrics analytics viewer 122 may also display correlation results of deviating metrics that are computed by mid-correlation module 118 .
- the correlation results may be shown in a graphical representation as depicted in FIG. 3 , or as a table of correlation results, or any other suitable representation.
- the combination of the deviations view and the correlations view may enable mid-metrics analytics viewer 122 to discover bottlenecks and probable causes of performance degradation of the nodes 104 and 106 being monitored by mid-level node 104 B.
- Top-level node 102 may contain top-correlation module 110 , top-metrics unified viewer 114 , and top-performance monitoring module 112 . Top-level node 102 may also store selected and/or aggregated metrics data received from a lower-level mid-level node 104 . In an embodiment, top-level node 102 may also receive and store selected and/or aggregated metrics data from a lower-level node 106 .
- Top-metrics monitoring module 112 may perform functions analogous to those described for mid-metrics monitoring module 120 . Top-metrics monitoring module 112 similarly receives collected metrics data (that are consolidated in an embodiment) from lower-level analytics nodes and stores the metrics data into top PMDB 108 . As discussed for mid-metrics monitoring module 120 , top-metrics monitoring module 112 may also receive application/network dependency mapping information to construct a system-wide dependency mapping for software applications 130 or a particular component or transaction in software applications 130 .
- Top-metrics monitoring module 112 may conversely push/propagate system-wide dependency mapping information to lower-level analytics nodes. As discussed above, the dependency information may be used to construct and/or prune correlation graphs at mid-level nodes 104 or local-level nodes 106 . In order to implement the previously described dynamic baselining and anomaly detection, top-metrics monitoring module 112 may also push/propagate various thresholds, demarcations, and rules used in the deviation scoring and alert triggering procedures performed in local-level nodes 106 .
- Top-correlation module 110 may initiate distributed correlation for a metric-of-interest by propagating the distributed correlation request among the child analytics nodes 104 and 106 .
- the distributed correlation for a metric-of-interest is initiated upon receiving a metric-of-interest selected by a user.
- the distributed correlation for a metric-of-interest is initiated upon receiving an alert that has been triggered by a local-level node 106 and propagated up system 100 .
- Top-level node 102 may similarly use the received dependency mapping information to selectively propagate the distributed correlation request to lower-level analytics nodes that are known to be relevant to the metric-of-interest.
- top-correlation module 110 may receive correlation results promoted from those lower-level nodes 104 and 106 . Then, top-correlation module 110 may aggregate deviation scores and rankings and determine the probably root cause for the metric anomaly.
- Top-metrics unified viewer 114 may be implemented as a dashboard that is configured to present two types of views: monitoring view and analytics view.
- the monitoring view may display metrics data received from mid-level nodes 104 at an instance in time. For example, a user may view response times (an example metric data) of an application in real-time using the dashboard.
- the analytics view may display the information received and processed by top-correlation module 110 and top-metrics monitoring module 112 and presents unified reporting of statistics for application metrics across disparate metric domains in system 100 .
- Top-metrics unified viewer 114 may also globally aggregate application-metrics statistics (including deviations) of the same type across lower-level analytics nodes 104 and 106 .
- top-metrics unified viewer 114 may provide a convenient and centralized dashboard for users to monitor and track the performance of operating software applications 130 in the system.
- analytics view may present analytics of metrics data in a drill down approach.
- a user within the analytics view of the dashboard may view a workflow of data within system 100 .
- the workflow may be presented and visualized in one or more runtime application dependency maps and/or network dependency maps.
- the workflow may be visualized as an application dependency map with capabilities to drill-down into network dependency maps corresponding to components of the application dependency map as described with regards to FIG. 6 .
- the application and network dependent maps may each be system or user generated.
- the analytics view may be configured to drill down into the workflow and show deviations of relevant metrics when a section of the workflow is selected by a user.
- the workflow view may be, for example, a flow of data through a network and/or various servers/computers.
- the analytics view may be configured to further drill down into the deviations view to show correlation results of selected deviating metrics.
- the presented correlation results may enable the user to identify one or more probable cause(s) of a deviating metric.
- the correlation results may be shown in a graphical representation as depicted in FIG. 3 , or as a table of correlation results, or any other suitable representation.
- mid-level nodes 104 may implement a version of top-metrics unified viewer 114 as discussed where mid-level nodes 104 may view analytics of data metrics of nodes being monitored by mid-level nodes 104 .
- system 100 may be massively scalable. Therefore, more local-level node(s) 106 may be added, more applications may be operated, and more metrics for those applications can be collected without significantly hindering the implementation of effective Application Performance Management.
- FIG. 4 illustrates a method 400 for performing a local correlation at a local-level node 106 , according to an embodiment.
- method 400 may also be performed by a mid-level node 104 .
- Method 400 may be performed by processing logic that may comprise hardware (e.g., circuitry, dedicated logic, programmable logic, microcode, etc.), software (e.g., instructions run on a processing device), or a combination thereof.
- correlation module 126 in local-level node 106 G may receive a distributed correlation request for an application metric of interest from a higher-level analytics node, such as mid-level node 104 B.
- the distributed correlation request may have been initiated at top-level node 102 .
- the distributed correlation request may be accompanied by a time series of the metric-of-interest to be correlated against metrics stored locally in local PMDB 124 .
- local-level node 106 G may also receive or previously receive application/network dependency mapping information associated with the particular metric-of-interest.
- correlation module 126 may identify available application metrics collected and stored in local PMDB 124 to be used in correlation calculations. In an embodiment, some available application metrics may be ignored if determined to be irrelevant to the metric-of-interest based on received application/network dependency mapping information.
- correlation module 126 may construct a graph of metrics most correlated with the metric-of-interest, wherein each node of the graph represents a metric and each edge between two nodes is associated with a strength of the correlation between the two nodes.
- various parameters such as the number of nodes in the graph or the levels of dependencies from the metric-of-interest (root node) may be constrained.
- correlation module 126 may be allotted certain processing resources by local-level 106 G or mid-level node 104 B. For example, graph construction may halt when memory and/or processing resource rises above a certain threshold on local-level node 106 G.
- One exemplary graph construction is depicted and discussed in FIG. 3 .
- correlation module 126 may prune the graph to eliminate less probable causal pathways based on the strength of correlation because a lower correlation coefficient may indicate less probably causal pathways.
- the pruning may alternatively (or in combination) be accomplished using search or mathematical programming techniques such as max-flow min-cut to identify path(s) of maximal end-to-end correlation strengths.
- the graph is further pruned based on received application/network dependency mapping information, for example as discussed in FIG. 3 .
- correlation module 126 may determine and select the node associated with the most probable cause for the anomaly in the metric-of-interest from the graph.
- the most probable cause and associated metric may be a node that is not directly connected to the metric-of-interest (root node). Instead, the selected node may be one or more levels from the root node. In an embodiment, one or more probable cause(s) (associated with highly correlated metrics) may be selected.
- correlation module 126 may propagate correlation results up system 100 via mid-level node 104 B. Each successively higher-level analytics node and associated correlation module 118 aggregates and analyzes the lower-level correlation results. At the highest-level analytics node, top-level node 102 , the top-metrics unified viewer 114 may present the aggregated and analyzed correlation results to an interested user. The user may then address the identified probable cause of performance degradation to maintain a level of service.
- FIG. 5 illustrates a method 500 for detecting/diagnosing application-performance degradation using distributed correlation, according to an embodiment.
- Method 500 may be performed by analytics nodes present in system 100 of FIG. 1 according to metrics monitoring described in FIG. 2 and correlation strategies/methods discussed in FIGS. 3-4 .
- Method 500 may be performed by processing logic that may comprise hardware (e.g., circuitry, dedicated logic, programmable logic, microcode, etc.), software (e.g., instructions run on a processing device), or a combination thereof.
- metrics monitoring module 128 in a local-level node 106 G may trigger an alert on a metric-of-interest collected by metrics data collection module 132 and stored in local PMDB 124 .
- the alert is triggered if performance degradation for a metric is detected/diagnosed.
- metrics monitoring module 128 may perform dynamic baselining to learn what ranges of values for metrics define “typical” behavior. Using bounds for “typical” metrics values, metrics monitoring module 128 may calculate deviation scores and trigger an alert if the deviation scores exceed a dynamically determined threshold.
- An exemplary deviation scoring process for identifying an anomalous metric (metric-of-interest) and consequently triggering the alert was described in FIG. 2 .
- a metrics monitoring module 128 may propagate the triggered alert to a higher-level analytics node (mid-level nodes 104 or top-level nodes 102 ).
- metric-of-interest data such as a time series (or consolidated metrics data) may be associated with and propagated along with the triggered alert.
- step 506 if the higher-level analytics node to receive the triggered alert in step 502 is not top-level node 102 , then the method 500 returns to step 504 .
- the triggered alert may be propagated up system 100 of hierarchically distributed analytics nodes until a top-level level node receives the triggered alert. Otherwise, method 500 proceeds to step 508 .
- top-level node 102 may receive the triggered alert and top-correlation module 110 in top-level node 102 may initiate a distributed correlation request, further described with reference to FIG. 1 .
- the initiation may include requesting lower-level analytics nodes to perform the distributed correlation request.
- the lower-level analytics node may make a determination as to whether to locally perform the distributed correlation or to propagate the distributed correlation request to its child lower-level analytics nodes 104 and 106 . If the lower-level analytics node is local-level node 106 , then a local correlation is performed. In an embodiment, a mid-level node 104 may locally perform the distributed correlation or propagate the distributed correlation request. Further embodiments and details are provided in FIG. 4 .
- the lower-level node 106 may perform the distributed correlation by first constructing a graph of metrics highly correlated with the metric-of-interest specified in the distributed, correlation request. Various metrics may be pruned from the graph and the metric(s) associated with the most probable cause of performance degradation may be selected.
- the lower-level node 106 may aggregate and analyze correlation results and/or propagate the correlation results to a higher-level analytics node, which may be top-level nodes 102 or mid-level nodes 104 . Further embodiments and details are described in FIGS. 1 and 4 .
- step 516 if the higher-level analytics node receiving the correlation results from 514 is not top-level node 102 , then the method proceeds to step 514 .
- the correlation results may be propagated up system 100 of hierarchically distributed analytics nodes until a top-level level node receives the correlated results. Otherwise, method 500 proceeds to step 518 .
- top-correlation module in top-level node 102 may aggregate and analyze the con-elation results received from the lower-level analytics nodes, for example described in FIG. 1 .
- top-correlation module may rank the correlation results based on the strength of correlation.
- top-correlation module may produce an ordered set of correlated metrics by ranking.
- top-metrics unified viewer 114 may present the probable cause for the metric anomaly and associated degradation in performance of software applications 130 .
- top-metrics unified viewer 114 may present and/or rank the most probable causes in a global dashboard interface.
- the global dashboard interface may allow a user to efficiently detect and diagnose performance degradation in system 100 . Other details and embodiments are described in FIG. 1 .
- Method 500 of FIG. 5 has been described as a bottom-up approach for determining one or more probable causes for anomalous metrics data.
- metrics data and deviating metrics are triggered by local-level nodes 106 first and propagated up the hierarchy top-level node 102 .
- top-level node 102 may receive the trigger and initiate correlation request to perform distributed correlation.
- top-level node 102 may itself initiate a distributed correlation request without being prompted by lower level nodes.
- This top-down approach may be implemented by steps 508 - 520 .
- top-level node 102 may initiate the correlation request without receiving any triggers from lower-level nodes.
- the triggering may instead be received by an administrative user operating top-level node 102 via, for example, top-metrics unified viewer 114 .
- Computer system 700 may be any well-known computer capable of performing the functions described herein.
- Computer system 700 includes one or more processors (also called central processing units, or CPUs), such as a processor 704 .
- processors also called central processing units, or CPUs
- Processor 704 is connected to a communication infrastructure or bus 706 .
- One or more processors 704 may each be a graphics processing unit (GPU).
- a GPU is a processor that is a specialized electronic circuit designed to process mathematically intensive applications.
- the GPU may have a parallel structure that is efficient for parallel processing of large blocks of data, such as mathematically intensive data common to computer graphics applications, images, videos, etc.
- Computer system 700 also includes user input/output device(s) 703 , such as monitors, keyboards, pointing devices, etc., that communicate with communication infrastructure 706 through user input/output interface(s) 702 .
- user input/output device(s) 703 such as monitors, keyboards, pointing devices, etc., that communicate with communication infrastructure 706 through user input/output interface(s) 702 .
- Computer system 700 also includes a main or primary memory 708 , such as random access memory (RAM).
- Main memory 708 may include one or more levels of cache.
- Main memory 708 has stored therein control logic (i.e., computer software) and/or data.
- Computer system 700 may also include one or more secondary storage devices or memory 710 .
- Secondary memory 710 may include, for example, a hard disk drive 712 and/or a removable storage device or drive 714 .
- Removable storage drive 714 may be a floppy disk drive, a magnetic tape drive, a compact disk drive, an optical storage device, tape backup device, and/or any other storage device/drive.
- Removable storage drive 714 may interact with a removable storage unit 718 .
- Removable storage unit 718 includes a computer usable or readable storage device having stored thereon computer software (control logic) and/or data.
- Removable storage unit 718 may be a floppy disk, magnetic tape, compact disk, DVD, optical storage disk, and/any other computer data storage device.
- Removable storage drive 714 reads from and/or writes to removable storage unit 718 in a well-known manner.
- secondary memory 710 may include other means, instrumentalities or other approaches for allowing computer programs and/or other instructions and/or data to be accessed by computer system 700 .
- Such means, instrumentalities or other approaches may include, for example, a removable storage unit 722 and an interface 720 .
- the removable storage unit 722 and the interface 720 may include a program cartridge and cartridge interface (such as that found in video game devices), a removable memory chip (such as an EPROM or PROM) and associated socket, a memory stick and USB port, a memory card and associated memory card slot, and/or any other removable storage unit and associated interface.
- Computer system 700 may further include a communication or network interface 724 .
- Communication interface 724 enables computer system 700 to communicate and interact with any combination of remote devices, remote networks, remote entities, etc. (individually and collectively referenced by reference number 728 ).
- communication interface 724 may allow computer system 700 to communicate with remote devices 728 over communications path 726 , which may be wired, and/or wireless, and which may include any combination of LANs, WANs, the Internet, etc. Control logic and/or data may be transmitted to and from computer system 700 via communication path 726 .
- a tangible apparatus or article of manufacture comprising a tangible computer useable or readable medium having control logic (software) stored thereon is also referred to herein as a computer program product or program storage device.
- control logic software stored thereon
- control logic when executed by one or more data processing devices (such as computer system 700 ), causes such data processing devices to operate as described herein.
- references herein to “one embodiment,” “an embodiment,” “an example embodiment,” or similar phrases indicate that the embodiment described may include a particular feature, structure, or characteristic, but every embodiment may not necessarily include the particular feature, structure, or characteristic. Moreover, such phrases are not necessarily referring to the same embodiment. Further, when a particular feature, structure, or characteristic is described in connection with an embodiment, it would be within the knowledge of persons skilled in the relevant art(s) to incorporate such feature, structure, or characteristic into other embodiments whether or not explicitly mentioned or described herein.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Debugging And Monitoring (AREA)
- Data Mining & Analysis (AREA)
- Environmental & Geological Engineering (AREA)
Abstract
Description
Claims (17)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/952,313 US10291463B2 (en) | 2015-10-07 | 2015-11-25 | Large-scale distributed correlation |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201562238218P | 2015-10-07 | 2015-10-07 | |
US14/952,313 US10291463B2 (en) | 2015-10-07 | 2015-11-25 | Large-scale distributed correlation |
Publications (2)
Publication Number | Publication Date |
---|---|
US20170104658A1 US20170104658A1 (en) | 2017-04-13 |
US10291463B2 true US10291463B2 (en) | 2019-05-14 |
Family
ID=58499127
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/952,313 Active 2036-06-10 US10291463B2 (en) | 2015-10-07 | 2015-11-25 | Large-scale distributed correlation |
Country Status (1)
Country | Link |
---|---|
US (1) | US10291463B2 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190087253A1 (en) * | 2017-09-20 | 2019-03-21 | International Business Machines Corporation | Real-Time Monitoring Alert Chaining, Root Cause Analysis, and Optimization |
US11157347B2 (en) * | 2019-12-02 | 2021-10-26 | EMC IP Holding Company LLC | Detection of resource bottlenecks in user devices using artificial intelligence and causal graphs |
US20220318082A1 (en) * | 2021-04-01 | 2022-10-06 | Bmc Software, Inc. | Root cause identification and event classification in system monitoring |
US20230244561A1 (en) * | 2022-02-03 | 2023-08-03 | Cisco Technology, Inc. | Localization of telemetry issues based on logical data flows |
Families Citing this family (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10325386B2 (en) * | 2016-03-31 | 2019-06-18 | Ca, Inc. | Visual generation of an anomaly detection image |
US10659481B2 (en) * | 2016-06-29 | 2020-05-19 | Paypal, Inc. | Network operation application monitoring |
US10873794B2 (en) * | 2017-03-28 | 2020-12-22 | Cisco Technology, Inc. | Flowlet resolution for application performance monitoring and management |
US10673714B1 (en) | 2017-03-29 | 2020-06-02 | Juniper Networks, Inc. | Network dashboard with multifaceted utilization visualizations |
USD877753S1 (en) | 2017-06-29 | 2020-03-10 | Juniper Networks, Inc. | Display screen with animated graphical user interface |
US10963330B2 (en) * | 2017-11-24 | 2021-03-30 | Microsoft Technology Licensing, Llc | Correlating failures with performance in application telemetry data |
US10911336B2 (en) * | 2018-10-22 | 2021-02-02 | Juniper Networks, Inc. | Scalable visualization of health data for network devices |
US10467360B1 (en) * | 2019-01-02 | 2019-11-05 | Fmr Llc | System and method for dynamically determining availability of a computing resource |
US11106525B2 (en) * | 2019-02-04 | 2021-08-31 | Servicenow, Inc. | Systems and methods for classifying and predicting the cause of information technology incidents using machine learning |
US10915428B2 (en) | 2019-06-27 | 2021-02-09 | Capital One Services, Llc | Intelligent services and training agent for application dependency discovery, reporting, and management tool |
US11379292B2 (en) | 2019-06-27 | 2022-07-05 | Capital One Services, Llc | Baseline modeling for application dependency discovery, reporting, and management tool |
US11093378B2 (en) | 2019-06-27 | 2021-08-17 | Capital One Services, Llc | Testing agent for application dependency discovery, reporting, and management tool |
US10642719B1 (en) | 2019-06-27 | 2020-05-05 | Capital One Services, Llc | Intelligent services for application dependency discovery, reporting, and management tool |
US10521235B1 (en) | 2019-06-27 | 2019-12-31 | Capital One Services, Llc | Determining problem dependencies in application dependency discovery, reporting, and management tool |
US10747544B1 (en) | 2019-06-27 | 2020-08-18 | Capital One Services, Llc | Dependency analyzer in application dependency discovery, reporting, and management tool |
US11354222B2 (en) | 2019-06-27 | 2022-06-07 | Capital One Services, Llc | Discovery crawler for application dependency discovery, reporting, and management tool |
US11443205B2 (en) * | 2019-12-13 | 2022-09-13 | Salesforce.Com, Inc. | Self-managing database system using machine learning |
US20220021697A1 (en) * | 2020-07-20 | 2022-01-20 | FireScope, Inc. | Network asset risk analysis |
US11379333B2 (en) * | 2020-09-11 | 2022-07-05 | Dell Products L.P. | Managing notifications across ecosystems |
US11757736B2 (en) * | 2021-01-08 | 2023-09-12 | Vmware , Inc. | Prescriptive analytics for network services |
US11379444B1 (en) | 2021-01-28 | 2022-07-05 | International Business Machines Corporation | Data-analysis-based facility for adjusting trace fields of a database trace |
WO2022169809A1 (en) * | 2021-02-03 | 2022-08-11 | Sc Networks, Incorporated | Satellite communications network intrusion detection system and method |
WO2022223093A1 (en) * | 2021-04-19 | 2022-10-27 | Telefonaktiebolaget Lm Ericsson (Publ) | Detecting an attack on a communication network |
US11294723B1 (en) * | 2021-06-25 | 2022-04-05 | Sedai Inc. | Autonomous application management for distributed computing systems |
US12003427B2 (en) * | 2022-06-30 | 2024-06-04 | Ncr Voyix Corporation | Integrated environment monitor for distributed resources |
CN117274005B (en) * | 2023-11-21 | 2024-02-09 | 西昌学院 | Big data pushing method and system based on digital education |
Citations (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6012152A (en) * | 1996-11-27 | 2000-01-04 | Telefonaktiebolaget Lm Ericsson (Publ) | Software fault management system |
US20030097588A1 (en) * | 2001-10-25 | 2003-05-22 | Fischman Reuben S. | Method and system for modeling, analysis and display of network security events |
US6606744B1 (en) * | 1999-11-22 | 2003-08-12 | Accenture, Llp | Providing collaborative installation management in a network-based supply chain environment |
US6671818B1 (en) * | 1999-11-22 | 2003-12-30 | Accenture Llp | Problem isolation through translating and filtering events into a standard object format in a network based supply chain |
US6947376B1 (en) * | 1999-10-21 | 2005-09-20 | At&T Corp. | Local information-based restoration arrangement |
US20050228763A1 (en) * | 2004-04-03 | 2005-10-13 | Altusys Corp | Method and Apparatus for Situation-Based Management |
US20060230309A1 (en) * | 2005-04-12 | 2006-10-12 | Kromer Mark A | System for remote fault management in a wireless network |
US7130807B1 (en) * | 1999-11-22 | 2006-10-31 | Accenture Llp | Technology sharing during demand and supply planning in a network-based supply chain environment |
US20060268679A1 (en) * | 2005-05-25 | 2006-11-30 | Mei Deng | Local information-based restoration arrangement |
US20070230361A1 (en) * | 2006-04-03 | 2007-10-04 | Hewlett-Packard Development Company, L.P. | Sniffing-based network monitoring |
US20080046266A1 (en) * | 2006-07-07 | 2008-02-21 | Chandu Gudipalley | Service level agreement management |
US20080144488A1 (en) * | 2006-12-19 | 2008-06-19 | Martti Tuulos | Method and System for Providing Prioritized Failure Announcements |
US7490073B1 (en) * | 2004-12-21 | 2009-02-10 | Zenprise, Inc. | Systems and methods for encoding knowledge for automated management of software application deployments |
US20090177692A1 (en) * | 2008-01-04 | 2009-07-09 | Byran Christopher Chagoly | Dynamic correlation of service oriented architecture resource relationship and metrics to isolate problem sources |
US7600007B1 (en) * | 1999-05-24 | 2009-10-06 | Computer Associates Think, Inc. | Method and apparatus for event correlation in service level management (SLM) |
US20090259749A1 (en) * | 2006-02-22 | 2009-10-15 | Emulex Design & Manufacturing Corporation | Computer system input/output management |
US20090319658A1 (en) * | 2008-06-24 | 2009-12-24 | France Telecom | Method and system to monitor equipment of an it infrastructure |
US20100103823A1 (en) * | 2007-03-27 | 2010-04-29 | Nokia Siemens Networks Gmbh & Co. | Operating network entities in a communications system comprising a management network with agent and management levels |
US20110276836A1 (en) * | 2008-10-16 | 2011-11-10 | Chen Kahana | Performance analysis of applications |
US8086708B2 (en) * | 2005-06-07 | 2011-12-27 | International Business Machines Corporation | Automated and adaptive threshold setting |
US20120054554A1 (en) * | 2010-08-27 | 2012-03-01 | Assaf Dagan | Problem isolation in a virtual environment |
US20120054331A1 (en) * | 2010-08-27 | 2012-03-01 | Assaf Dagan | Correlation of metrics monitored from a virtual environment |
US8200527B1 (en) * | 2007-04-25 | 2012-06-12 | Convergys Cmg Utah, Inc. | Method for prioritizing and presenting recommendations regarding organizaion's customer care capabilities |
US20130262656A1 (en) * | 2012-03-30 | 2013-10-03 | Jin Cao | System and method for root cause analysis of mobile network performance problems |
US20140172371A1 (en) * | 2012-12-04 | 2014-06-19 | Accenture Global Services Limited | Adaptive fault diagnosis |
US20140222998A1 (en) * | 2013-02-05 | 2014-08-07 | Cisco Technology, Inc. | Learning machine based detection of abnormal network performance |
US20140222996A1 (en) * | 2013-02-05 | 2014-08-07 | Cisco Technology, Inc. | Dynamically adjusting a set of monitored network properties using distributed learning machine feeback |
US20150281011A1 (en) * | 2014-04-01 | 2015-10-01 | Ca, Inc. | Graph database with links to underlying data |
US9537720B1 (en) * | 2015-12-10 | 2017-01-03 | International Business Machines Corporation | Topology discovery for fault finding in virtual computing environments |
US20170075749A1 (en) * | 2015-09-14 | 2017-03-16 | Dynatrace Llc | Method And System For Real-Time Causality And Root Cause Determination Of Transaction And Infrastructure Related Events Provided By Multiple, Heterogeneous Agents |
US20170134247A1 (en) * | 2015-11-10 | 2017-05-11 | Dynatrace Llc | System and method for measuring performance and availability of applications utilizing monitoring of distributed systems processes combined with analysis of the network communication between the processes |
US20170154275A1 (en) * | 2015-12-01 | 2017-06-01 | Linkedin Corporation | Statistical detection of site speed performance anomalies |
US20170155537A1 (en) * | 2015-12-01 | 2017-06-01 | Linkedin Corporation | Root cause investigation of site speed performance anomalies |
US20170155570A1 (en) * | 2015-12-01 | 2017-06-01 | Linkedin Corporation | Analysis of site speed performance anomalies caused by server-side issues |
US20180034685A1 (en) * | 2016-07-29 | 2018-02-01 | Appdynamics Llc | Algorithms for Root Cause Analysis |
US20180115464A1 (en) * | 2016-10-26 | 2018-04-26 | SignifAI Inc. | Systems and methods for monitoring and analyzing computer and network activity |
US10037232B1 (en) * | 2017-01-31 | 2018-07-31 | Ca, Inc. | Alarms with stack trace spanning logical and physical architecture |
US20180219743A1 (en) * | 2017-01-31 | 2018-08-02 | Ca, Inc. | Integrated infrastructure and application performance monitoring |
US20180248905A1 (en) * | 2017-02-24 | 2018-08-30 | Ciena Corporation | Systems and methods to detect abnormal behavior in networks |
US20180276063A1 (en) * | 2017-03-23 | 2018-09-27 | Netscout Systems, Inc | Situation analysis |
-
2015
- 2015-11-25 US US14/952,313 patent/US10291463B2/en active Active
Patent Citations (42)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6012152A (en) * | 1996-11-27 | 2000-01-04 | Telefonaktiebolaget Lm Ericsson (Publ) | Software fault management system |
US7600007B1 (en) * | 1999-05-24 | 2009-10-06 | Computer Associates Think, Inc. | Method and apparatus for event correlation in service level management (SLM) |
US6947376B1 (en) * | 1999-10-21 | 2005-09-20 | At&T Corp. | Local information-based restoration arrangement |
US6606744B1 (en) * | 1999-11-22 | 2003-08-12 | Accenture, Llp | Providing collaborative installation management in a network-based supply chain environment |
US6671818B1 (en) * | 1999-11-22 | 2003-12-30 | Accenture Llp | Problem isolation through translating and filtering events into a standard object format in a network based supply chain |
US7130807B1 (en) * | 1999-11-22 | 2006-10-31 | Accenture Llp | Technology sharing during demand and supply planning in a network-based supply chain environment |
US20030097588A1 (en) * | 2001-10-25 | 2003-05-22 | Fischman Reuben S. | Method and system for modeling, analysis and display of network security events |
US20050228763A1 (en) * | 2004-04-03 | 2005-10-13 | Altusys Corp | Method and Apparatus for Situation-Based Management |
US7490073B1 (en) * | 2004-12-21 | 2009-02-10 | Zenprise, Inc. | Systems and methods for encoding knowledge for automated management of software application deployments |
US20060230309A1 (en) * | 2005-04-12 | 2006-10-12 | Kromer Mark A | System for remote fault management in a wireless network |
US20060268679A1 (en) * | 2005-05-25 | 2006-11-30 | Mei Deng | Local information-based restoration arrangement |
US8086708B2 (en) * | 2005-06-07 | 2011-12-27 | International Business Machines Corporation | Automated and adaptive threshold setting |
US20090259749A1 (en) * | 2006-02-22 | 2009-10-15 | Emulex Design & Manufacturing Corporation | Computer system input/output management |
US20070230361A1 (en) * | 2006-04-03 | 2007-10-04 | Hewlett-Packard Development Company, L.P. | Sniffing-based network monitoring |
US20080046266A1 (en) * | 2006-07-07 | 2008-02-21 | Chandu Gudipalley | Service level agreement management |
US20080144488A1 (en) * | 2006-12-19 | 2008-06-19 | Martti Tuulos | Method and System for Providing Prioritized Failure Announcements |
US20100103823A1 (en) * | 2007-03-27 | 2010-04-29 | Nokia Siemens Networks Gmbh & Co. | Operating network entities in a communications system comprising a management network with agent and management levels |
US8200527B1 (en) * | 2007-04-25 | 2012-06-12 | Convergys Cmg Utah, Inc. | Method for prioritizing and presenting recommendations regarding organizaion's customer care capabilities |
US20090177692A1 (en) * | 2008-01-04 | 2009-07-09 | Byran Christopher Chagoly | Dynamic correlation of service oriented architecture resource relationship and metrics to isolate problem sources |
US20090319658A1 (en) * | 2008-06-24 | 2009-12-24 | France Telecom | Method and system to monitor equipment of an it infrastructure |
US20110276836A1 (en) * | 2008-10-16 | 2011-11-10 | Chen Kahana | Performance analysis of applications |
US20120054554A1 (en) * | 2010-08-27 | 2012-03-01 | Assaf Dagan | Problem isolation in a virtual environment |
US20120054331A1 (en) * | 2010-08-27 | 2012-03-01 | Assaf Dagan | Correlation of metrics monitored from a virtual environment |
US20130262656A1 (en) * | 2012-03-30 | 2013-10-03 | Jin Cao | System and method for root cause analysis of mobile network performance problems |
US20140172371A1 (en) * | 2012-12-04 | 2014-06-19 | Accenture Global Services Limited | Adaptive fault diagnosis |
US20140222998A1 (en) * | 2013-02-05 | 2014-08-07 | Cisco Technology, Inc. | Learning machine based detection of abnormal network performance |
US20140222996A1 (en) * | 2013-02-05 | 2014-08-07 | Cisco Technology, Inc. | Dynamically adjusting a set of monitored network properties using distributed learning machine feeback |
US9628362B2 (en) * | 2013-02-05 | 2017-04-18 | Cisco Technology, Inc. | Learning machine based detection of abnormal network performance |
US20150281011A1 (en) * | 2014-04-01 | 2015-10-01 | Ca, Inc. | Graph database with links to underlying data |
US20170075749A1 (en) * | 2015-09-14 | 2017-03-16 | Dynatrace Llc | Method And System For Real-Time Causality And Root Cause Determination Of Transaction And Infrastructure Related Events Provided By Multiple, Heterogeneous Agents |
US10084672B2 (en) * | 2015-11-10 | 2018-09-25 | Dynatrace Llc | System and method for measuring performance and availability of applications utilizing monitoring of distributed systems processes combined with analysis of the network communication between the processes |
US20170134247A1 (en) * | 2015-11-10 | 2017-05-11 | Dynatrace Llc | System and method for measuring performance and availability of applications utilizing monitoring of distributed systems processes combined with analysis of the network communication between the processes |
US20170154275A1 (en) * | 2015-12-01 | 2017-06-01 | Linkedin Corporation | Statistical detection of site speed performance anomalies |
US20170155537A1 (en) * | 2015-12-01 | 2017-06-01 | Linkedin Corporation | Root cause investigation of site speed performance anomalies |
US20170155570A1 (en) * | 2015-12-01 | 2017-06-01 | Linkedin Corporation | Analysis of site speed performance anomalies caused by server-side issues |
US9537720B1 (en) * | 2015-12-10 | 2017-01-03 | International Business Machines Corporation | Topology discovery for fault finding in virtual computing environments |
US20180034685A1 (en) * | 2016-07-29 | 2018-02-01 | Appdynamics Llc | Algorithms for Root Cause Analysis |
US20180115464A1 (en) * | 2016-10-26 | 2018-04-26 | SignifAI Inc. | Systems and methods for monitoring and analyzing computer and network activity |
US10037232B1 (en) * | 2017-01-31 | 2018-07-31 | Ca, Inc. | Alarms with stack trace spanning logical and physical architecture |
US20180219743A1 (en) * | 2017-01-31 | 2018-08-02 | Ca, Inc. | Integrated infrastructure and application performance monitoring |
US20180248905A1 (en) * | 2017-02-24 | 2018-08-30 | Ciena Corporation | Systems and methods to detect abnormal behavior in networks |
US20180276063A1 (en) * | 2017-03-23 | 2018-09-27 | Netscout Systems, Inc | Situation analysis |
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190087253A1 (en) * | 2017-09-20 | 2019-03-21 | International Business Machines Corporation | Real-Time Monitoring Alert Chaining, Root Cause Analysis, and Optimization |
US20190087252A1 (en) * | 2017-09-20 | 2019-03-21 | International Business Machines Corporation | Real-Time Monitoring Alert Chaining, Root Cause Analysis, and Optimization |
US10534658B2 (en) * | 2017-09-20 | 2020-01-14 | International Business Machines Corporation | Real-time monitoring alert chaining, root cause analysis, and optimization |
US10552247B2 (en) * | 2017-09-20 | 2020-02-04 | International Business Machines Corporation | Real-time monitoring alert chaining, root cause analysis, and optimization |
US11157347B2 (en) * | 2019-12-02 | 2021-10-26 | EMC IP Holding Company LLC | Detection of resource bottlenecks in user devices using artificial intelligence and causal graphs |
US20220318082A1 (en) * | 2021-04-01 | 2022-10-06 | Bmc Software, Inc. | Root cause identification and event classification in system monitoring |
US11640329B2 (en) * | 2021-04-01 | 2023-05-02 | Bmc Software, Inc. | Using an event graph schema for root cause identification and event classification in system monitoring |
US12130699B2 (en) | 2021-04-01 | 2024-10-29 | Bmc Software, Inc. | Using an event graph schema for root cause identification and event classification in system monitoring |
US20230244561A1 (en) * | 2022-02-03 | 2023-08-03 | Cisco Technology, Inc. | Localization of telemetry issues based on logical data flows |
Also Published As
Publication number | Publication date |
---|---|
US20170104658A1 (en) | 2017-04-13 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10291463B2 (en) | Large-scale distributed correlation | |
US10637745B2 (en) | Algorithms for root cause analysis | |
US10373094B2 (en) | Automated model based root cause analysis | |
US20210073680A1 (en) | Data driven methods and systems for what if analysis | |
Chen et al. | CauseInfer: Automated end-to-end performance diagnosis with hierarchical causality graph in cloud environment | |
US9658910B2 (en) | Systems and methods for spatially displaced correlation for detecting value ranges of transient correlation in machine data of enterprise systems | |
US9612932B2 (en) | System, method, and computer program product for monitoring computer system infrastructure and assets | |
US11099967B2 (en) | Multi-dimensional selective tracing | |
US10692007B2 (en) | Behavioral rules discovery for intelligent computing environment administration | |
US10230601B1 (en) | Systems and methods for integrated modeling and performance measurements of monitored virtual desktop infrastructure systems | |
US9798644B2 (en) | Monitoring system performance with pattern event detection | |
US10402052B2 (en) | Guided exploration of root cause analysis | |
US10177984B2 (en) | Isolation of problems in a virtual environment | |
Jiang et al. | Efficient fault detection and diagnosis in complex software systems with information-theoretic monitoring | |
US9122784B2 (en) | Isolation of problems in a virtual environment | |
US10419553B2 (en) | Dynamic docker pool recycling | |
US20180123922A1 (en) | Correlating performance outliers and network performance impacting event metric | |
US20200374199A1 (en) | Techniques for correlating service events in computer network diagnostics | |
US10372482B2 (en) | Domain transversal based transaction contextualization of event information | |
US10877866B2 (en) | Diagnosing workload performance problems in computer servers | |
US11438239B2 (en) | Tail-based span data sampling | |
Yu et al. | TraceRank: Abnormal service localization with dis‐aggregated end‐to‐end tracing data in cloud native systems | |
US8073946B1 (en) | Monitoring of metrics to identify abnormalities in a large scale distributed computing environment | |
US10324818B2 (en) | Data analytics correlation for heterogeneous monitoring systems | |
US7921410B1 (en) | Analyzing and application or service latency |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: RIVERBED TECHNOLOGY, INC., CALIFORNIA Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SYKES, EDWARD A.;REEL/FRAME:037142/0626 Effective date: 20151118 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
AS | Assignment |
Owner name: MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:RIVERBED TECHNOLOGY, INC.;REEL/FRAME:049720/0808 Effective date: 20190703 Owner name: MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT, MARYLAND Free format text: PATENT SECURITY AGREEMENT;ASSIGNOR:RIVERBED TECHNOLOGY, INC.;REEL/FRAME:049720/0808 Effective date: 20190703 |
|
AS | Assignment |
Owner name: ATERNITY LLC, MASSACHUSETTS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:RIVERBED TECHNOLOGY, INC.;REEL/FRAME:054778/0540 Effective date: 20200101 |
|
AS | Assignment |
Owner name: MACQUARIE CAPITAL FUNDING LLC, NEW YORK Free format text: SECURITY INTEREST;ASSIGNORS:RIVERBED HOLDINGS, INC.;RIVERBED TECHNOLOGY, INC.;ATERNITY LLC;REEL/FRAME:056397/0750 Effective date: 20210420 |
|
AS | Assignment |
Owner name: ATERNITY LLC, CALIFORNIA Free format text: RELEASE OF SECURITY INTEREST IN PATENTS RECORED AT REEL 056397, FRAME 0750;ASSIGNOR:MACQUARIE CAPITAL FUNDING LLC;REEL/FRAME:057983/0356 Effective date: 20211012 Owner name: RIVERBED TECHNOLOGY, INC., CALIFORNIA Free format text: RELEASE OF SECURITY INTEREST IN PATENTS RECORED AT REEL 056397, FRAME 0750;ASSIGNOR:MACQUARIE CAPITAL FUNDING LLC;REEL/FRAME:057983/0356 Effective date: 20211012 Owner name: RIVERBED HOLDINGS, INC., CALIFORNIA Free format text: RELEASE OF SECURITY INTEREST IN PATENTS RECORED AT REEL 056397, FRAME 0750;ASSIGNOR:MACQUARIE CAPITAL FUNDING LLC;REEL/FRAME:057983/0356 Effective date: 20211012 |
|
AS | Assignment |
Owner name: ALTER DOMUS (US) LLC, AS COLLATERAL AGENT, ILLINOIS Free format text: PATENT SECURITY AGREEMENT SUPPLEMENT - SECOND LIEN;ASSIGNORS:RIVERBED HOLDINGS, INC.;RIVERBED TECHNOLOGY, INC.;ATERNITY LLC;REEL/FRAME:057810/0559 Effective date: 20211013 Owner name: MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT, MARYLAND Free format text: PATENT SECURITY AGREEMENT SUPPLEMENT - FIRST LIEN;ASSIGNORS:RIVERBED HOLDINGS, INC.;RIVERBED TECHNOLOGY, INC.;ATERNITY LLC;REEL/FRAME:057810/0502 Effective date: 20211013 |
|
AS | Assignment |
Owner name: WILMINGTON TRUST, NATIONAL ASSOCIATION, MINNESOTA Free format text: PATENT SECURITY AGREEMENT;ASSIGNORS:RIVERBED TECHNOLOGY, INC.;ATERNITY LLC;REEL/FRAME:057943/0386 Effective date: 20211013 |
|
AS | Assignment |
Owner name: WILMINGTON TRUST, NATIONAL ASSOCIATION, AS U.S. COLLATERAL AGENT, MINNESOTA Free format text: SECURITY INTEREST;ASSIGNORS:RIVERBED TECHNOLOGY LLC (FORMERLY RIVERBED TECHNOLOGY, INC.);ATERNITY LLC;REEL/FRAME:058486/0216 Effective date: 20211207 |
|
AS | Assignment |
Owner name: ATERNITY LLC, MASSACHUSETTS Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:WILMINGTON TRUST, NATIONAL ASSOCIATION, AS U.S. COLLATERAL AGENT;REEL/FRAME:058593/0169 Effective date: 20211207 Owner name: RIVERBED TECHNOLOGY, INC., CALIFORNIA Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:WILMINGTON TRUST, NATIONAL ASSOCIATION, AS U.S. COLLATERAL AGENT;REEL/FRAME:058593/0169 Effective date: 20211207 Owner name: ATERNITY LLC, MASSACHUSETTS Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:ALTER DOMUS (US) LLC, AS COLLATERAL AGENT;REEL/FRAME:058593/0108 Effective date: 20211207 Owner name: RIVERBED TECHNOLOGY, INC., CALIFORNIA Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:ALTER DOMUS (US) LLC, AS COLLATERAL AGENT;REEL/FRAME:058593/0108 Effective date: 20211207 Owner name: ATERNITY LLC, MASSACHUSETTS Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT;REEL/FRAME:058593/0046 Effective date: 20211207 Owner name: RIVERBED TECHNOLOGY, INC., CALIFORNIA Free format text: TERMINATION AND RELEASE OF SECURITY INTEREST IN PATENTS;ASSIGNOR:MORGAN STANLEY SENIOR FUNDING, INC., AS COLLATERAL AGENT;REEL/FRAME:058593/0046 Effective date: 20211207 |
|
AS | Assignment |
Owner name: RIVERBED TECHNOLOGY LLC, CALIFORNIA Free format text: CHANGE OF NAME;ASSIGNOR:RIVERBED TECHNOLOGY, INC.;REEL/FRAME:059009/0906 Effective date: 20211207 |
|
MAFP | Maintenance fee payment |
Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment: 4 |
|
AS | Assignment |
Owner name: RIVERBED HOLDINGS, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:ALTER DOMUS (US) LLC, AS COLLATERAL AGENT;REEL/FRAME:064673/0739 Effective date: 20211207 Owner name: ATERNITY LLC, MASSACHUSETTS Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:ALTER DOMUS (US) LLC, AS COLLATERAL AGENT;REEL/FRAME:064673/0739 Effective date: 20211207 Owner name: RIVERBED TECHNOLOGY, INC., CALIFORNIA Free format text: RELEASE BY SECURED PARTY;ASSIGNOR:ALTER DOMUS (US) LLC, AS COLLATERAL AGENT;REEL/FRAME:064673/0739 Effective date: 20211207 |